About your Search

20130416
20130424
Search Results 0 to 2 of about 3
personnel along our borders as well as utilization of proven surveillance technology along the highest traffic areas across the southwest border. reducing wait times at the ports of entry the budget requests 35rks00 port officers. to scurel maritime borders the budget invests in coast guard assets, including the seven national security cutter and fast response cutters. the bum continues the department's focus on smart enforcement of our country's immigration laws. it supports the administration's effort to focus the enforcement system on safety threats and the integrity of the immigration system through childhood arrivals and greater use of rosecutor yull discretion. we support more cost effective initiatives of secure communities. e budget invests in monitory compliance to work sight related laws. while continuing to support alternatives to the tension, detention reform and immigrant immigration efforts. comprehensive immigration reform will help us build on these efforts and strengthen boarder security by enabling d.h.s. while focusing on criminals, human smallingers and those who im
and the military side. i've constantly tried to improve how we address the need for the next generation technology, public-private cooperation and ensuring that we have the price personnel to counter this 21st century cyberthreat. however, i am uncompromising in safeguarding the rights of our citizens and i will never sacrifice our civil liberties for unneeded intrusion. to this end, the amendment i am offering today would strengthen existing provisions in the bill to include the privacy officer and the officer for civil rights and civil liberties of the department of homeland security askey stakeholders in the report that would a-- as key stakeholders in the report. this report would assess how this legislation affected our civil liberties and privacy throughout our federal government, and the department of homeland security is the -- the key civil department in our federal government that develops and implements cybersecurity protocalls for the rest of the -- protocols for the rest of the federal government. it is crucial that they be part of any assessment and work with both the privacy office
of their own people and continue to develop technology it is a matter of time before they have technology to reach us. do you agree with that? >> probably so. if they keep working at it and they have a single-minded focus focus, particularly the current leader may be more intensely than his father i think feels that is the key to their survival. >> i think that is a good honest assessment put them in the bucket of threats that the nation faces a capable of north korea with larger missiles and probably smaller bombs producing that is a reasonable threat we should plan against if nothing changes? >> i do blie that. >> syria. to give enough chemical weapons to kill thousands? >> potentially yes and that is very dependent on lots of things are the number of casualties that could be incurred in favor employee. >> but they have a lot that could killltofpele >> correct. that's another step. over the last six months as we are imposing sanctions and negotiating through the regime do they have more or less enriched uranium? >> we will get you the exact numbers enclosed context. >> can i say it is m
Search Results 0 to 2 of about 3